1 Discussion of “The Importance of the COBIT Framework IT Processes For Effective Internal Control over the Reliability of Financial Reporting: An International.

Slides:



Advertisements
Similar presentations
The Institute & the Profession Personalize here with presenter name.
Advertisements

PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
The Influence of Internal Audit on Information Security Effectiveness October 5, 2013 Perceptions of Internal Auditors Graham Gal With Paul Steinbart,
Analisa Proses. Terjemahan model analisis menjadi desain software.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Learning Objectives LO1 Describe the conceptual audit risk model and its components. LO2 Explain the usefulness and limitations of the audit risk model.
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
Sodexo.com Group Internal Audit. page 2 helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and.
Comparative Analysis of IT Control Frameworks in the Context of SOX By: Malik Datardina, CA, CISA University of Waterloo.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
TI BISNIS ITG using COBIT &
The Importance of the COBIT Framework IT Processes For Effective Internal Control over the Reliability of Financial Reporting: An International Survey.
COBIT Framework Source:
COBIT - II.
IT Governance Capability Maturity within Government
Roger Southgate Past President of ISACA London Chapter Member of the BSI Committees for Service Management and IT Governance Leader.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Managing Information Technology Service Delivery
By Collin Smith COBIT Introduction By Collin Smith
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Audit Practices A consolidation of suggested and applied models Punta del Este, Uruguay 28 October 2005.
1 What is Internal Audit’s Role in Management’s Assertion The Institute of Internal Auditors May 11, 2004 Xenia Ley Parker, CIA, CISA, CFSA Principal XLP.
Learning Objectives LO1 Distinguish between management and auditor’s responsibilities regarding an auditee organization’s internal controls. LO2 Explain.
Fox & Sons Company: IT Change Management Policy Presentation Britt Bouknight Caitlyn Carney Xiaoyue Jiu Abey P John David Lanter Leonardo Serrano.
Information Technology Audit
Planning an Internal Audit JM García Merced. Brainstorm.
Internal Auditing and Outsourcing
Introduction to IT Auditing
© 2007 ISACA ® All Rights Reserved DAMA-NCR Chapter Meeting March 11, 2008.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Section Topics Establish a framework for assessing risk
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
This Lecture Covers Review of Internal Control Definitions.
Chapter Three IT Risks and Controls.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
Discussion of “ Comparing the Attitudes and Activities of Internal Auditors in Australia, Canada, and the United States Regarding Green IT,” by Glen Gray,
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Impacts of the self- assessment on the SAIs Dainius Jakimavičius Director Information Technology Department.
The Institute and the Profession: 1 Personalize your title and presenter here. The Institute and the Profession The Institute and the Profession: 1.
© ITGI not for commercial use. 1 C OBI T ® Presentation Package Sample 10 Slides of 80-slide Deck The C OBI T ® framework explained in a complete.
Advanced Accounting Information Systems Day 20 Control and Security Frameworks October 9, 2009.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Everyone’s Been Hacked Now What?. OakRidge What happened?
Chapter 9: Introduction to Internal Control Systems
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
C OBI T and slides © 2007 IT Governance Institute. Used with permission. An Overview of C OBI T ®
Quality Improvement Strategy
This Lecture Covers Roles of –Management –IT Personnel –Users –Internal Auditors –External Auditors.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
IT Auditor’s Role in IT Governance Fred C. Roth, CISA MIS Training Institute Session 425.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
ISACA Willamette Valley Chapter Luncheon Thursday, March 20, 2008 Practical Auditors Guide for CobiT Steve Balough, CISA.
Dr. Yeffry Handoko Putra, M.T
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
A Framework for Control
Alignment of COBIT to Botswana IT Audit Methodology
Presentation transcript:

1 Discussion of “The Importance of the COBIT Framework IT Processes For Effective Internal Control over the Reliability of Financial Reporting: An International Survey” by David S. Kerr and Uday S. Murthy By Brad Tuttle Moore School of Business University of South Carolina Presented to UWCISA Toronto, CA October 12, 2007

2 I like this study because Potential to influence practice Potential to aid in developing theory of internal control in IT setting

3 Motivation Present state of knowledge: IC is ill-defined Unclear how IT affects IC COBIT should help get us started Research Questions: Which IT processes are important to internal control in a financial audit context? What affects consensus?

4 Method Participants: 189 members of ISACA respond to survey –Drawn from 21 different countries Familiarity with COBIT is less important than –Familiarity with IT processes (see Table 1) –Familiarity with financial statement audits

5 Suggestion International Participants: Countries with Investor focus (n=138) –Australia26 –Canada 3 –USA95 –S. Africa?14 Countries with non-investor focus (n=51)

6 Method On-line survey asks participants to –Rate 34 COBIT processes for their “…perception of the importance of each IT process to achieving effective internal control over the reliability of financial reporting…” –Indicate which 10 processes are most important … –Implementation measures (problematic, not reported)

7 Research Question 1 In the context of the reliability of financial reporting, what is the relative importance of each of the 34 IT control and security processes?

8 Table 1a COBIT Processes Sorted by Mean Importance Ratings COBIT Version 3 ProcessDescription of process Ranked by KW Import. Rating Ranked by TV Risk Rating DS5Ensure System Security12 AI6Manage Changes21 PO9Assess Risk34 DS11Manage Data46 M2Assess Internal Control Adequacy55 PO8Ensure Compliance with External Requirements63 DS10Manage Problems and Incidents78 AI4Develop and Maintain Procedures811 M1Monitor the Process912 PO11Manage Quality10

9 John Rady Ernst & Young LLP 404 IT: Changes to Compliance and Cutting Cost$ (Webcast 2005) M2 AI6 AI4 DS5 M1 ? ? ? ? ?

10 Tuttle and Vandervelde (2007) Question posed to IT auditors (n=29): “consider the risk to the typical organization associated with an unsatisfactory outcome in each of the following CobiT processes.” Rank correlation = with KM importance ratings

11 Table 1a COBIT Processes Sorted by Mean Importance Ratings COBIT Version 3 ProcessDescription of process Ranked by KM Import. Rating Ranked by TV Risk Rating DS5Ensure System Security12 AI6Manage Changes21 PO9Assess Risk34 DS11Manage Data46 M2Assess Internal Control Adequacy55 PO8Ensure Compliance with External Requirements63 DS10Manage Problems and Incidents78 AI4Develop and Maintain Procedures811 M1Monitor the Process912 PO11Manage Quality10

12 COBIT Version 3 ProcessDescription of process Ranked by KM Import. Rating Ranked by TV Risk Rating DS4Ensure Continuous Service1117 M4Provide for Independent Audit1220 DS7Educate and Train Users13 PO10Manage Projects1422 M3Obtain Independent Assurance1516 DS9Manage the Configuration1614 PO2Define the Information Architecture1729 DS13Manage Operations18 PO1Define a strategic IT plan199 AI5Install and Accredit Systems207 Table 1a COBIT Processes Sorted by Mean Importance Ratings

13

14

15 Table 2 CobiT v.4 Importance Ratings For the Ten Most Important IT Processes per Kerr and Murthy CobiT ProcessDescriptsion Mean KM Importance Rating CobiT Importance DS5Ensure System Security4.661High AI6Manage Changes4.487High PO9Assess Risk4.413Medim DS11Manage Data4.333High M2Assess Internal Control Adequacy4.328Medium PO8Ensure Compliance with External Requirements (version 4=ME 3) 4.222High DS10Manage Problems and Incidents4.101Medium AI4Develop and Maintain Procedures4.085Low M1Monitor the Process4.079High PO11Manage Quality (version 4=PO8)4.074Medium

16 Table 2 CobiT v.4 Importance Ratings For the Ten Most Important IT Processes per Kerr and Murthy Importance LevelCount Mean Importance Ranking High Medium Low14.085

17

18 COSO and COBIT Analysis Dependent Variable: KM importance ratings Independent Variables (coded P=1): Control Evaluation Risk Assessment Control Activities Information and Communication Monitoring

19 Research Question 2 In the context of the reliability of financial reporting, to what extent does the relative importance of each of the 34 IT control and security processes vary as a function of characteristics of the IT professionals within the organization?

20 Better Questions AIS serve multiple informational purposes within organizations: How does importance differ for financial audits compared to IT in general? How do perceptions differ between management, IT personnel, and auditors? Pre versus Post SOX experience?

21 Table 3 Exploratory Factor Analysis of Ten Most Important IT Processes Using Tuttle and Vandervelde 2007 Data CobiT ProcessDescriptionFactor 1Factor 2 Eigenvalue M2Assess Internal Control Adequacy M1Monitor the Process PO9Assess Risk AI4Develop and Maintain Procedures DS10Manage Problems and Incidents DS11Manage Data DS5Ensure System Security AI6Manage Changes PO11Manage Quality (version 4=PO8) PO8Ensure Compliance with External Requirements (version 4=ME 3)

22 Nitpicks CobiT version 4 drops the term “best practices” Some COBIT processes change from version 3 to version 4 Tables 7, 8, and 9 not related to research questions

23 I like this study because Potential to influence practice –What is and isn’t important –What is the relationship between IT and COSO Potential to aid in developing theory of internal control in IT setting –What constitutes IC –COBIT = framework (theory) of IT control